First published: Tue Apr 09 2024(Updated: )
The Gutenberg Blocks by Kadence Blocks – Page Builder Features plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.26 via the 'kadence_import_get_new_connection_data' AJAX action. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
KadenceWP Gutenberg Blocks with AI | <3.2.12 | |
KadenceWP Gutenberg Blocks with AI | <=3.1.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6964 has a medium severity level due to its potential for exploitation via Server-Side Request Forgery.
To fix CVE-2023-6964, update the Kadence Gutenberg Blocks plugin to version 3.2.12 or later.
CVE-2023-6964 affects all versions of the Kadence Gutenberg Blocks plugin up to and including 3.1.26.
The attack vector for CVE-2023-6964 is the 'kadence_import_get_new_connection_data' AJAX action, allowing authenticated attackers to exploit the vulnerability.
Yes, all users with versions up to 3.1.26 are vulnerable to CVE-2023-6964 if they have the plugin installed.